Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 8,481 - 8,500 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.29s Refine Results
  1. 8481
  2. 8482

    Dynamic Patch-Based Sample Generation for Pulmonary Nodule Segmentation in Low-Dose CT Scans Using 3D Residual Networks for Lung Cancer Screening by Ioannis D. Marinakis, Konstantinos Karampidis, Giorgos Papadourakis, Mostefa Kara

    Published 2025-03-01
    “…To address the challenges of processing large CT volumes, an efficient patch-based extraction pipeline was developed. …”
    Get full text
    Article
  3. 8483

    Achieving Business Excellence by Optimizing Corporate Forensic Readiness by Gojko Grubor, Ivan Barać, Nataša Simeunović, Nenad Ristić

    Published 2017-02-01
    “…Proposed model can, first of all, help managers of small and medium-sized companies to justify their decisions to employ digital forensic investigators and include them in their information security teams in order to choose the optimal CCIDFI model and improve forensic readiness in the computer incident management process that will result with minimization of potential losses of company in the future and improve its business quality.…”
    Get full text
    Article
  4. 8484

    Electromagnetic radiation security estimation on the residential building roof for cellular antenna by MarinaYu. . Zvezdina, Andrey V. Shokov, Yulia A. Shokova, Alexey R Lebedev

    Published 2015-09-01
    “…The difference between the developed model and the known ones lies within the research possibility not only in the computational points but within a whole computational plane. …”
    Get full text
    Article
  5. 8485

    Digital Humanities: Is it a New Science or a Set of Models and Practices of the Global Network Project? by R. I. Mamina, E. E. Yelkina

    Published 2020-10-01
    “…In general, those changes characterize the process of the new science image development in the network society.…”
    Get full text
    Article
  6. 8486

    Criteria and indicators for assessing the quality of the investigation of an information security incident as part of a targeted cyberattack by S. I. Smirnov, M. A. Eremeev, Sh. G. Magomedov, D. A. Izergin

    Published 2024-05-01
    “…Methods informed by purposeful process efficiency and set theory are used along with expert evaluation approaches.Results. …”
    Get full text
    Article
  7. 8487

    Crowdsourcing Evaluation of Video Summarization Algorithm by Avrajyoti Dutta, Dawid Juszka, Mikołaj Leszczuk

    Published 2024-11-01
    “…This technique helps in dividing a task into multiple parts, and each of these parts is then evaluated using a large group of individuals to solve problems that are otherwise difficult to solve using traditional computational machines. In this study, we offer a crowdsourcing subjective experiment in which summaries of processed video sequences are evaluated. …”
    Get full text
    Article
  8. 8488

    THE IMPACT OF LIQUEFIED NATURAL GAS COMPOSITION AND TECHNOLOGICAL CHARACTERISTICS OF THE STARTING STORAGE OF THE EQUIPMENT AT THE TIME OF OCCURRENCE OF THE PHENOMENON OF ROLLOVER by R. A. Khuramshina, A. I. Yamalov

    Published 2019-07-01
    “…The use of the ANSYS software package of computational fluid dynamics in the process of heat and mass transfer of the stratified liquid in the liquefied natural gas storage is necessary when calculating the increased accuracy.…”
    Get full text
    Article
  9. 8489
  10. 8490
  11. 8491
  12. 8492

    Hermitian matrix inversion algorithm by Marina Yuryevna Zvezdina, Olga Valeryevna Komova, Nikolay Valentinovich Shatskiy, Andrey Victorovich Shokov

    Published 2015-06-01
    “…Because of complexity and a large operation number, Gaussian-Jordan method does not allow realizing the real time signal processing in computing systems of the adaptive antenna arrays that are widely used in communication, radiolocation, and radio navigation systems. …”
    Get full text
    Article
  13. 8493

    Weapon detection with FMR-CNN and YOLOv8 for enhanced crime prevention and security by Shanthi P, Manjula V

    Published 2025-07-01
    “…To overcome these challenges, the suggested system combines closed-circuit television (CCTV) surveillance cameras with advanced deep learning methods, image processing, and computer vision techniques for real-time crime prediction and prevention. …”
    Get full text
    Article
  14. 8494
  15. 8495
  16. 8496
  17. 8497

    Study on Title Encoding Methods for e-Commerce Downstream Tasks by Cristian Cardellino, Rafael Carrascosa

    Published 2022-05-01
    “…We also propose an adaptation of a deep network architecture from the Computer Vision field: ``Bootstrap Your Own Latent'' (BYOL), to learn product embeddings based on the title and compare it to several industrial baselines as well as some state-of-the-art supervised models. …”
    Get full text
    Article
  18. 8498
  19. 8499

    Selected Topics on Advanced Information Systems Engineering: Editorial Introduction to the Issue 5 of CSIMQ by Janis Grabis, Kurt Sandkuhl

    Published 2015-12-01
    “…., conceptual modeling, database systems, business process management, requirements engineering, human computer interaction, and enterprise computing to address various practical challenges in development and application of information systems. …”
    Get full text
    Article
  20. 8500

    CURRENT POSSIBILITIES OF RADIATION DIAGNOSIS OF PROSTATE CANCER by F. A. Kossov, B. P. Olimov, G. I. Akhverdieva, B. Sh. Kamolov, I. I. Abdullin, V. O. Panov, E. V. Tarachkova, I. E. Tyurin, Yu. V. Buydenok

    Published 2017-12-01
    “…The paper discusses their sensitivity and specificity and the role and relationship in the diagnostic process. It also gives current unified mpMRI reporting and data system version 2 (RADSv.2). …”
    Get full text
    Article